U.S. policy options toward stopping North Korea's illicit activities
Trimble, Meridee Jean
Olsen, Edward A.
Russell, James A.
MetadataShow full item record
North Korea began its involvement in illicit activities in the 1970s, but it took the United States until the new millennium to develop a series of major law enforcement approaches to counter these activities. North Korea's illicit activities are purportedly the funding input for the development of its nuclear weapons program, which constitutes the output. The main illicit activities to be discussed include drug production and trafficking, the counterfeiting of U.S. currency, cigarettes and pharmaceuticals, missile sales and human trafficking. The United States has aggressively addressed the nuclear threat that North Korea poses, but has been slow to address the inputs that fund the outputs. This thesis seeks to answer the question of why it took the United States over three decades to address the illicit activities of North Korea that purportedly fund its nuclear program.
Showing items related by title, author, creator and subject.
Thompson, Lacey (Monterey, CA; Naval Postgraduate School, 2019-12);Opioid dependence in the United States has reached unprecedented levels, having risen substantially since 2012. Fentanyl’s contribution to the opioid epidemic has been of particular concern and has caught the attention of ...
Albright, David; Stricker, Andrea; Wood, Houston (Center on Contemporary Conflict, Naval Postgraduate School, 2013-07-29);Of the roughly two dozen countries that have pursued or obtained nuclear weapons during the last fifty years, almost all of them depended importantly on foreign supplies. As a short term projection over the next five to ...
UNMASKING USER IDENTITIES BY CLUSTERING ADDRESSES AND ANALYZING BEHAVIOR RELATED TO BLOCKCHAIN TRANSACTIONS Loy, Yao Wen; Lee, Zhenfeng (Monterey, CA; Naval Postgraduate School, 2020-03);An explosion of online transactions has occurred with recent developments in blockchain technology and the availability of Bitcoin and other cryptocurrencies as a form of stored value. With its feature of pseudo-anonymity, ...